Hi all, little follow up.
We ( fuckyouhotwkd3xh.onion ) rewrote the hosting engine and now it
splits the virtual hosts over multiple Tor session, 30 hidden services
per Tor session.
We are currently hosting 636 vhost, php-fpm consumes 671MB of RAM
and 21 Tor session, consuming 458MB of RAM.
On
Hi, is there a misunderstanding or we missed something in between where
a bunch of simple sysadmins (us) become Tor developers and rewrite Tor
HS code ?
On 2014-12-09 22:36, grarpamp wrote:
On Mon, Dec 8, 2014 at 5:25 PM,
wrote:
Hi thanks for the input, any documentation on that ?
You'd
Hi thanks for the input, any documentation on that ?
On 2014-12-08 22:19, grarpamp wrote:
On Mon, Dec 8, 2014 at 5:11 PM,
wrote:
Hi yes we agree, we think that this is the best solution, currently.
We'll upgrade our hardware asap, adjust the scripts to have a
dedicated Tor
daemon for each v
Yes thanks for confirming.
Still wondering how big onion websites, for example major black-markets,
fight this problem :|
On 2014-12-07 12:45, Cyrus wrote:
I concur that this is a serious problem and at the moment anyone can
censor any hidden service at will. These attacks use little bandwidt
Hi yes we agree, we think that this is the best solution, currently.
We'll upgrade our hardware asap, adjust the scripts to have a dedicated
Tor daemon for each virtual host and hopefully move on.
On 2014-12-07 12:42, Cyrus wrote:
It was much easier to start running every hidden service as a
On 2014-12-03 16:17, Nik Cubrilovic wrote:
Blockchain.info has become the second site after Facebook to roll out
a Tor hidden service with a CA signed SSL certificate. You can find it
here:
https://blockchainbdgpzk.onion/
My blog post explaining some of the background and implementation
details
On 2014-12-02 21:45, l.m wrote:
Perhaps the new implementation of the hidden services will be better
?
How is it going ?
I don't see anything in the improvements suggested for hidden services
that would help this situation. Though I would be grateful for being
corrected.
First, I just want t
On 2014-12-02 02:51, Mirimir wrote:
On 12/01/2014 03:44 PM, fuckyouhost...@ruggedinbox.com wrote:
On 2014-12-01 07:55, Mirimir wrote:
On 12/01/2014 12:13 AM, fuckyouhost...@ruggedinbox.com wrote:
On 2014-12-01 02:24, Christian Gagneraud wrote:
On 01/12/14 14:46, fuckyouhost...@ruggedinbox.com
On 2014-12-01 12:24, l.m wrote:
I think it's also worth mentioning this may be an attack on your
service via your server's service provider. It's not impossible to
have one HS work fine but many cause timeouts as you begin to enable
all HS. As you begin to increase traffic to guards you give a
On 2014-12-01 07:55, Mirimir wrote:
On 12/01/2014 12:13 AM, fuckyouhost...@ruggedinbox.com wrote:
On 2014-12-01 02:24, Christian Gagneraud wrote:
On 01/12/14 14:46, fuckyouhost...@ruggedinbox.com wrote:
Hi List! We (try to) maintain a free hosting platform for hidden
service
websites, here: h
On 2014-12-01 02:24, Christian Gagneraud wrote:
On 01/12/14 14:46, fuckyouhost...@ruggedinbox.com wrote:
Hi List! We (try to) maintain a free hosting platform for hidden
service
websites, here: http://fuckyouhotwkd3xh.onion
but recently all the hosted hidden services became unreachable.
[...]
On 2014-12-01 01:46, fuckyouhost...@ruggedinbox.com wrote:
Hi List! We (try to) maintain a free hosting platform for hidden
service websites, here: http://fuckyouhotwkd3xh.onion
but recently all the hosted hidden services became unreachable.
Tor logs are correctly reporting the problem:
Dec 01
Hi List! We (try to) maintain a free hosting platform for hidden service
websites, here: http://fuckyouhotwkd3xh.onion
but recently all the hosted hidden services became unreachable.
Tor logs are correctly reporting the problem:
Dec 01 XXX [notice] Your Guard SoylentGreen (XXX) is failing more
13 matches
Mail list logo